# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64c429948c8168b288e65695c342868f1b8425941a632e28aaa2dec613075147
Pseudo Output
d23773186f3b549c74b7d0038a21a8b56d6d3a654f4c874ab39d64f813cab900
Key Image
3a3784b1893457e6f3a8cb713c74b0a6eea16493ede1d3cc7b8792cc89422917
Pseudo Output
0c6514b97cb0779e91e46664812fafc3628a9b3f13ae3b1d40ae54aea8695464
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96da3d93b8889bfd6f2f31cedc5270993f44e9c2a0c5bc89d5bb512b67c24962
Commitment
d0ffb0ed7ae0ea44021b5c8f3d1c83b8f164086e36ecea427633f17395167904
Range Proof
672 bytes (Bulletproof)
Memo
61e677929fb432ce88f09ab2587a765da9b89c414d5b60a0ccfb1b5ca433bc99f73f5b328af7499a828e458ed8b27421a9e49083afdfe0e048e66799364f1246fe8ce20346e569dd011684a37a99950544cb82d05c49fe3071b72b035b28fe4e376d6c953e2b7c96dcb58b857b30919b8a6bb930d505d83f9ed12effa974a89b (encrypted)
Stealth Address
c68f307708496c55610abbfada18b0ea3cc62cda9a0a662ccf43e93640316663
Commitment
2e2a24ab6aaf285cecd281a7bc87a9abd71e747fd9d62f9d2621e8869a56233f
Range Proof
672 bytes (Bulletproof)
Memo
8404e54022d1789821dd79a2e162dc0aef38bdf37aee46aff3682242ab56318a058a66c5d48380e6c31c78ce9f02f179bd58802ae92092776c9d1af3cec38af69b43a0f606e1587c36c632f647fe090f044f8274fd649e43d7462edc65fb1a54d86c7943b0d2f061baaffa4d20fb705dc6d6f87ba9cc3a38a85f43236bfb79b0 (encrypted)